darklord wrote:
> 
> On Monday 03 June 2002 11:39 am, you wrote:
> > And this leads to the simple conclusion that if one has physical access to
> > a computer, then security is largely out the window.  Any clown could come
> > in and bootup with a rescue disk (addressing the linux aspect) and do
> > whatever to your drives.  If they had the time, they could also bring in a
> > set of linux distro disks and reinstall linux their way.
> >
> > The only way to prevent this is to turn off the booting from CD in bios and
> > password protecting bios, but then, with physical access it is trivial to
> > kill the bios password (just crack the case and remove the mobo battery for
> > a minute - bios settings are back to default and accessible without a
> > password).

Unless your mobo flashroms the password; came across this and had to get
tech support to explain that first you must remove the battery, THEN you
must pull a jumper, then you must short out some pins on the BIOS chip
where it is soldered to the board....little paranoid maybe?



> >
> > Thus, I see no harm at all in hearing the means one would use to create a
> > UID 0 person, append them to passwd and create an appropriately
> > formatted/encrypted shadow password for them in /etc/shadow.
> >
> > praedor
> 
> Hehehehe, I've got mine disabled in BIOS, and my case is hardware locked. Of
> course, if someone has access to my system, then they've already gotten into

Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com

Reply via email to